PassBreaker: A Comprehensive Guide to Advanced Password Cracking Techniques

2 years ago

Even though cybersecurity is always changing, cracking passwords is still an important skill for security workers to have. "PassBreaker," a…

WinDiff: A Comprehensive Tool for Windows Binary Comparison and Analysis

2 years ago

WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of Microsoft Windows binaries…

Aladdin: Advanced .NET Payload Generation and Execution Techniques

2 years ago

.-. [.-''-., | //`~\) (<| 0\0|>_ ";\ _"/ \\_ _, __\|'._/_ \ '='-, /\ \ || )_///_\>> ( '._ T…

T3SF: A Quickstart Guide to Modular Event Orchestration

2 years ago

T3SF is a framework that offers a modular structure for the orchestration of events based on a master scenario events…

NimExec: Fileless Command Execution via MS-SCMR

2 years ago

Basically, NimExec is a fileless remote command execution tool that uses The Service Control Manager Remote Protocol (MS-SCMR). It changes…

NetAtlas C2 Server Search: Detecting Command and Control Servers with Netlas API

2 years ago

C2 Search Netlas is a Java utility designed to detect Command and Control (C2) servers using the Netlas API. It…

Porch Pirate: A Comprehensive Reconnaissance and OSINT Framework for Postman

2 years ago

Porch Pirate started as a tool to quickly uncover Postman secrets, and has slowly begun to evolve into a multi-purpose…

ScrapedIn: Enhancing Red Team Operations with Advanced LinkedIn Data Scraping for Target Company Analysis

2 years ago

Tool to scrape LinkedIn This tool assists in performing reconnaissance using the LinkedIn.com website/API for red team or social engineering…

DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results

2 years ago

Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.…

All-in-One Bug Hunting Setup: The Ultimate Debian Linux Script for Cybersecurity Enthusiasts

2 years ago

In the always-changing world of cybersecurity, it's important to be quick and careful. For Debian Linux users who are really…